F5 Networks Alert
3291Warning Date
Severity Level
Warning Number
Target Sector
26 August, 2020
● High
2020-1687
All
Description:
F5 Networks has released security updates and alerts to address multiple vulnerabilities in the following products:
- BIG-IP (LTM, AAM, Advanced WAF, AFM, Analytics, APM, ASM, DDHD, DNS, FPS, GTM, Link Controller, PEM, SSLO)
- 15.1.0
- 15.0.0 - 15.1.0
- 14.1.0 - 14.1.2
- 13.1.0 - 13.1.3
- 12.1.0 - 12.1.5
- 11.5.2 - 11.6.5
- BIG-IQ Centralized Management
- 7.0.0
- 6.0.0 - 6.1.0
- 5.4.0
- Traffix SDC
- 5.0.0 - 5.1.0
Threats:
Attacker could exploit these vulnerabilities by doing the following:
- Man in the middle attack.
- Cross-site scripting (XSS) attack.
- Cross-site request forgery (CSRF).
- Read sensitive files in the root directory.
- SQL injection.
- Execute arbitrary code.
Best practice and Recommendations:
The CERT team encourages users to review F5 Networks security advisory and apply the necessary updates:
- https://support.f5.com/csp/article/K55873574
- https://support.f5.com/csp/article/K94563369
- https://support.f5.com/csp/article/K20606443
- https://support.f5.com/csp/article/K26464312
- https://support.f5.com/csp/article/K00103216
- https://support.f5.com/csp/article/K42830212
- https://support.f5.com/csp/article/K05975972
- https://support.f5.com/csp/article/K43404629
- https://support.f5.com/csp/article/K37466356
- https://support.f5.com/csp/article/K11400411
- https://support.f5.com/csp/article/K40843345
- https://support.f5.com/csp/article/K25160703
- https://support.f5.com/csp/article/K29923912
- https://support.f5.com/csp/article/K12936322
- https://support.f5.com/csp/article/K57214921
- https://support.f5.com/csp/article/K45421311
- https://support.f5.com/csp/article/K72752002
F5 Networks also recommends taking the following preventive measures:
- Secure access to the BIG-IP system to ensure that the TMUI is only accessible by trusted users.
- Permit management access to the BIG-IP ASM system over a secure network and limit shell access to only trusted users.